Video Screencast Help
Give us your opinion and win with Symantec! Please help us by taking this survey and tell us about your satisfaction level using Symantec Connect. One lucky winner will receive 500 Connect points!* Take the survey.
new discussion 30 Jun 2016
I have had Symantec Full Disk Encryption installed on my laptop which is dual boot with linux and windows. My hard drive was fully encrypted. I have deleted the drive with linux on it resulting in boot MBR corruption. Now when i run windows recovery and try to repair startup it dosnt find the hard drive as it is encrypted. Screenshot attached. Need help.
updated discussion 30 Jun 2016
Hi all, I currently have a 2003 SBS server running Mail security for exchange 6.5. The antispam has come up for renewal and on trying to apply the new license and it failing I realised I had been given a license for Endpoint Protection SBE 2013 instead. On querying this I was told that Mail security has been incorperated into Endpoint security now and that is what I require. I have now ...
updated discussion 30 Jun 2016
Hello We are permission-based email marketing provider and we only allowed client to send opt-in emails. We have this error when sending to some domains. But we just received this report 501 Connection rejected by policy [7.7] 10802, please visit www.messagelabs.com/support for more details about this error message. And it is not send IP address. So that we don't know which IP  address on ...
updated discussion 30 Jun 2016
i get "cannot execute binary file" error when i run "./esmsetup" in order to install agent for CCS my CentOS is 64 bit any advice on this?
updated discussion 30 Jun 2016
Hi everyone, does someone know the syntax I can use in an ADC policy to allow all processes signed by a defined publisher? My idea is to permit all processes signed by Citrix in this case. Thank you, Caroline
new idea 30 Jun 2016
Hi, it would be great, if it was possible to define the software (cert) publisher as an argument to block or permit applications in ADC. You can do so in DCS and it's very helpful, i.e. to allow all signed Citrix software on a client without having to list every application or to peermit a whole directory. Thank you, Caroline
new discussion 30 Jun 2016
I have had Symantec Full Disk Encryption installed on my laptop which is dual boot with linux and windows. My hard drive was fully encrypted. I have deleted the drive with linux on it resulting in boot MBR corruption. Now when i run windows recovery and try to repair startup it dosnt find the hard drive as it is encrypted. Screenshot attached. Need help.
updated discussion 30 Jun 2016
Hi all, I currently have a 2003 SBS server running Mail security for exchange 6.5. The antispam has come up for renewal and on trying to apply the new license and it failing I realised I had been given a license for Endpoint Protection SBE 2013 instead. On querying this I was told that Mail security has been incorperated into Endpoint security now and that is what I require. I have now ...
updated discussion 30 Jun 2016
Hello We are permission-based email marketing provider and we only allowed client to send opt-in emails. We have this error when sending to some domains. But we just received this report 501 Connection rejected by policy [7.7] 10802, please visit www.messagelabs.com/support for more details about this error message. And it is not send IP address. So that we don't know which IP  address on ...
updated discussion 30 Jun 2016
i get "cannot execute binary file" error when i run "./esmsetup" in order to install agent for CCS my CentOS is 64 bit any advice on this?
updated discussion 30 Jun 2016
Hi everyone, does someone know the syntax I can use in an ADC policy to allow all processes signed by a defined publisher? My idea is to permit all processes signed by Citrix in this case. Thank you, Caroline
updated article 29 Jun 2016
Introduction By popular demand, below is an index of my Connect articles.  Illustrated, semi-formal and mildly amusing, I hope they assist admins and individuals along their neverending quest to find a safe path in this ever more dangerous world.... Security Series The first article, Using SEPM Alerts and Reports to Combat a Malware Outbreak, demonstrated how to use ...
new article 28 Jun 2016
Introduction This is the fourteenth in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions), see Mick's Greatest Hits: Index of Helpful Connect Security Articles. With the cross-referencing trick illustrated in this article, ...
new article 28 Jun 2016
The heading itself is appealing enough, for most of us to immediately agree and even guess what I am about to write next. The cloud brokers, CASB and changing demographics overall are going to make things really interesting in the next 5 years I’m sure. The promise that ‘absolutely nothing?’ is going to be hosted locally now, yet letting the data/business owners completely control the egress ...
updated article 27 Jun 2016
I recently notice, Symantec End Point spontaneously changed group to "avdefs", when some new change is introduced e. g. creating new sftp directories etc.  It seems  problems occur during Symantec installation  "avdefs" is a group local to the system (i.e., not in LDAP), so it's important to have it not conflict with existing LDAP groups Pasted output below: On ...
updated article 27 Jun 2016
We can upgrade Symantec Messaging Gateway (SMG) without Internet access. Since version 10, we can upgrade SMG locally. Here are the steps: Preparation: 1. Install IIS on a Windows OS which located on the same network of the SMG 2. Expand the Default Web Site of the IIS, double-click the 'MIME Types': 3. Click 'Add' of the MIME Types: 4. Input '.iso' of the 'File name extension', for the ...
updated article 27 Jun 2016
Symantec Endpoint Encryption v11.0.1 Recovery Procedure from an UnExpected corruption of OS.   Important Note:  Do & Don’ts for Symantec Endpoint Encryption => Never format “C” drive or System Boot Drive (Where OS is installed) without performing Decryption for all the drives. If “C”  drive or System Boot Drive (OS in installed) is formatted then data is unrecoverable ...
updated article 27 Jun 2016
Creating a Windows PE (WinPE) Image for SEE Recovery 1. Open Deployment and Imaging Tools Environment (Run As Administrator) If you don’t have to obtain and install from the following link Download WinPE: https://www.microsoft.com/en-us/download/details.aspx?id=30652 2. Creating Image For 32-bit Windows environment            copype.cmd x86 ...
new article 27 Jun 2016
Symantec Endpoint Encryption v11.0.1 [ Knowledge Base ] Best practices to follow prior to performing Symantec Disk Encryption  The following best practices are recommended for preparing to encrypt your disk with Symantec Drive Encryption. Please follow the recommendations below to protect your data during and after encryption. Before you encrypt your disk, there are a few tasks you ...
updated article 24 Jun 2016
As of SCU2016-1 there is only “CIS Microsoft Windows Server 2012 V 1.0.0” standard in Predefined folder which is currently few years old and lagging behind latest CIS benchmarks: CIS Microsoft Windows Server 2012 non-R2 Benchmark v2.0.0 CIS Microsoft Windows Server 2012 R2 Benchmark v2.2.0 In this article I’ll focus on implementing following checks from above CIS benchmarks which can extend ...
new blog entry 29 Jun 2016
世界中の情報を厳重に保護すること―それがシマンテックの掲げる使命です。シマンテックは、当社製品ができるだけ効果を発揮するように、社内の専門家とセキュリティ研究コミュニティの力を借りて、製品に潜む脆弱性を監視しています。また、修正に迅速に対応し、適切なタイミングで製品のアップデートを公開できるよう心がけています。標準的なベストプラクティスの一環として、シマンテックが製品の保護機能を強化するために常に行っているのが、定期的なアップデートです。ノートン製品とエンタープライズ製品どちらをお使いのお客様も、最大限の保護を得られるように、製品のアップデートを忘れないようにしてください。 このたび、Google 社のセキュリティ調査チームである Project Zero の研究者から、シマンテック製品をレビューした結果、8 ...
new blog entry 29 Jun 2016
At Symantec, we take our mission to protect the world’s information very seriously. To ensure that our products are as effective as possible, we rely on Symantec experts and the security research community to watch for potential product vulnerabilities so we can act swiftly to remediate and issue product updates accordingly. As part of our standard best practices, we continually improve the ...
updated blog entry 29 Jun 2016
According to the 2016 Internet Security Threat Report (ISTR), email continues to be the primary attack vector for cybercriminals. Complex email threats seek to exploit the weakest link in the chain―humans. Malware in email leverages social engineering to convince its recipient to open an attachment or click on a link. Threats like Trojan Dridex use email spam campaigns masquerading as ...
new blog entry 29 Jun 2016
投稿人:Tommy Dong 赛门铁克发现谷歌市场上有一款应用程序可盗取知名社交软件Viber上的图片和视频。这款名为“海狸帮计数器”的应用程序表面上伪装成一款流行纸牌游戏的计分程序,而实际上暗中搜索与Viber相关的媒体文件,并将这些文件传送至远程服务器。 图1. 海狸帮计数器盗取Viber上的媒体文件 笑一个! 我们在对该应用程序进行逆向工程研究时确认该程序所执行的恶意行为。 图2. ...
updated blog entry 29 Jun 2016
寄稿:  Tommy Dong シマンテックは、広く利用されているソーシャルメディアアプリ Viber から写真や動画を盗み出すアプリを Google Play で発見しました。このアプリ「Beaver Gang Counter」は、人気のカードゲームで利用するスコア記録アプリに偽装していますが、裏では Viber アプリ関連のメディアファイルを検索し、リモートサーバーに送り付けています。 図 1. Viber のメディアファイルを盗み出す Beaver Gang Counter アプリ はい、チーズ! Beaver Gang Counter をリバースエンジニアリングしたところ、悪質な活動が確認されました。 図 2. Beaver Gang Counter アプリで見つかった、Viber メディアファイルを盗み出すコード このアプリには、Viber ...
updated blog entry 28 Jun 2016
Contributor: Tommy Dong Symantec has discovered an app on Google Play that steals photos and videos from the popular social media app Viber. Beaver Gang Counter masquerades as a score keeping app for a popular card game but secretly searches for media files related to the Viber app and sends them to a remote server. Figure 1. The Beaver Gang Counter app steals Viber media files Say ...
updated blog entry 28 Jun 2016
This is the third part of a four-part series covering twelve fundamentals for choosing a managed PKI solution, and questions to ask in the buying process. In Part 2, we shared three key differences between Symantec and other managed public key infrastructure (PKI) providers around administration and deployment. This week, we will discuss four features of Symantec Managed PKI that ...
updated blog entry 27 Jun 2016
As a member of the Connect Community, we value your opinion about how we're doing and where we can improve. Please help us by taking this survey and tell us about your experience with Symantec Connect. One lucky winner will receive 500 Connect points!* Take the survey. * The winner will be selected from a random drawing of survey respondents and will be announced via this blog post on ...
new blog entry 27 Jun 2016
Webinar 0804: Intelligent Endpoint Security: Why Taking A Modern Approach Matters  Abstract:  Endpoint security is a critical component in an organization's security program and is needed to gain the visibility necessary to rapidly detect threats and contain them before criminals gain access to critical resources.  Join us for an interactive discussion and learn more ...
new download 17 Jun 2016
Ever had the CCS Agent registered with wrong name or agent IP changed? In some situations it can be pain to fix this as it requires going to agent and running the registration again (imaging you do not have access to agent server and you have to raise ticket to 3rd party supplier and he asks you to raise a change request). Well with these two simple scripts, you can change both agent name and ...
new download 16 May 2016
To make use of stop-words for russian language, download attached file, unzip it and place to the "Protect\config\stopwords" subfolder in the Symantec DLP installation directory. Then go to the "Advanced settings" page of selected detection server and set the variable "Lexer.StopwordLanguages" to "en,ru". Do it for every detection server you have.
updated download 22 Apr 2016
Symantec DCS Policy Utility v1.0.0.11 For Windows OS (Note .NET Framework 4.5 is required) Designed to help you tune your policy by processing the log files from an Agent. There's a getting started tab that explains the best steps to get the logs and events you need to troubleshoot your policy. The program does not make any changes to the machine or policy. It parses the sisidsevents and ...
updated download 01 Apr 2016
When a customer is using the forensics software "Encase 7" with our Symantec Endpoint Encryption Full Disk 8.2.0 software, the customer will need the appropriate DLLs so that the Encase product can successfully work with our Full Disk product. The DLLs required are attached here and can also be located within the original product download under the subfolder "utilities". The DLLs required in ...
updated download 01 Apr 2016
At times, a customer may require the details for creating a batch file (startup script) to assist in the uninstallation of a Symantec Endpoint Encryption Device Control client that was installed via GPO. You cannot use the automatic uninstall feature in the GPO software installation package because the Device Control uninstall procedure is password protected. To uninstall Device Control you ...
new download 01 Mar 2016
Symantec Data Loss Prevention- Triggering Endpoint Response Rules Video
new event 27 Jun 2016
Topic: Securing Regional Banking with ITS and Symantec Speaker: Matt Reid, ITS VP of Risk Management Date: Thu, Jul 7, 2016 11:00 AM - 12:00 PM EST Details: Regional Banks and Credit Unions are mobilizing to improve security and it’s no surprise why. Finance is a preferred target for cybercriminals and they are moving down market to medium ...
new event 27 Jun 2016
Endpoint security is a critical component in an organization's security program and is needed to gain the visibility necessary to rapidly detect threats and contain them before criminals gain access to critical resources.  Join us for an interactive discussion and learn more about  • How emerging security technologies are helping organizations defend against targeted attacks ...
updated event 27 Jun 2016
The Philadelphia Security User Group invites you and all Symantec customers in the Mid-Atlantic region to join us for our annual user group meeting at Hershey Park, PA on Friday, August 5 from 9:00 am to 1:00 pm. Breakfast will be served for you, with free park tickets for your whole family! Register Today! Agenda Behind the Scenes Forensics - Real World Attacks, the Tools We Use and How to ...
updated event 24 Jun 2016
Please join us for the next Western New York User Group meeting on Tuesday, June 28 from 12:00 p.m. to 2:30 p.m. at Dave & Busters. Our meeting will be a good mix of customer presentation and time for networking with other Symantec Security users in the area. Lunch will be served! Agenda:  Welcome, Introductions, and Lunch Customer Presentation: Kevin Haley – ISTR Report ...
updated event 21 Jun 2016
The Philadelphia Security User Group invites you and all Symantec customers in the Mid-Atlantic region to join us for our annual user group meeting at Hershey Park, PA on Friday, August 5 from 9:00 am to 1:00 pm. Breakfast will be served for you, with free park tickets for your whole family! Register ...
updated event 18 Jun 2016
NetX a Symantec Authorized Training Partner (ATP) delivers Instructor-led Training Classes either on-site or remotely.  We offer over 20 different Symantec Classes, for a complete list please visit netxinc.com/training Attend from your home, office or one of our convenient locations.   Our training classes are Guaranteed to Run, We Never Cancel!  Symantec Endpoint ...
updated event 18 Jun 2016
NetX a Symantec Authorized Training Partner (ATP) delivers Instructor-led Training Classes either on-site or remotely.  We offer over 20 different Symantec Classes, for a complete list please visit netxinc.com/training Attend from your home, office or one of our convenient locations.   Our training classes are Guaranteed to Run, We Never Cancel!  The Symantec Control ...
updated event 18 Jun 2016
NetX a Symantec Authorized Training Partner (ATP) delivers Instructor-led Training Classes either on-site or remotely.  We offer over 20 different Symantec Classes, for a complete list please visit netxinc.com/training Attend from your home, office or one of our convenient locations.   Our training classes are Guaranteed to Run, We Never Cancel!  Symantec Data Loss ...
updated video 17 Jun 2016
In this quick update our risk management expert, John Higday, highlights the updates in ATP 2.0.2 which  provides IT security teams with the best visibility in their endpoint environment.   Advanced Threat Protection - Expose, prioritize, and remediate sophisticated advanced attacks across endpoints, networks, and email, from one single console.   Download our ATP whitepaper at ...
updated video 19 May 2016
This video will help new customers to provision their domains and inbound routes once they have access to the administration portal. If you want a desktop aid to provide a step by step guide as to the tool, then please download that here.
new video 17 May 2016
Bay Dynamics recently announced the availability of the standalone IT Analytics Server 2.1, which includes an enhanced web based cube browser. This video walks you through how as an existing Symantec Endpoint Protection customer, you can leverage IT Analytics Server to visualize your cube data and take advantage of its benefits.
updated video 17 May 2016
Bay Dynamics recently announced the availability of the standalone IT Analytics Server 2.1, which includes an enhanced web based cube browser. This video walks you through how as an existing Symantec customer, you can leverage IT Analytics Server to visualize your cube data and take advantage of its benefits.
new video 17 May 2016
In this video, we demonstrate how to install the new standalone IT Analytics Server v2.1 with the Symantec Data Loss Prevention content pack.
updated video 17 May 2016
This training module aims to walk you through how to setup a new business partner in the Encryption module of the Management Portal. Watch more Videos in the Self-serve TLS video series: Self-serve TLS: Moving domains from one Business Partner to another Self-serve TLS: Getting visibility into your enforcements Self-serve TLS: Enforcing TLS encryption between you and the Email Security ...
new video 13 May 2016
This video shows you the new features in Advanced Threat Protection 2.0.2.
updated video 13 May 2016
In this video, you'll see how you can use a STIX file to perform a database search in Advanced Threat Protection 2.0.2 and later.
new idea 30 Jun 2016
Hi, it would be great, if it was possible to define the software (cert) publisher as an argument to block or permit applications in ADC. You can do so in DCS and it's very helpful, i.e. to allow all signed Citrix software on a client without having to list every application or to peermit a whole directory. Thank you, Caroline
updated idea 29 Jun 2016
Bonjour, Nous utilisons Symantec Mail Gateway 10.5.4 depuis quelques temps maintenant. Nous utilisons les listes d'expéditeurs Symantec Global, et de plus en plus de noms de domaines ou d'IP sont blacklistés, et pour cette raison il peux nous arriver de temporairement ajouter des IP en tant que "adresse IP d'expéditeur approuvé en local". Cepandant, ces ajouts doivent rester ...
new idea 29 Jun 2016
Our organization is in the midst of an Exchange migration from On-Premise to Office365. Relaying from the SEPM console doesn't work so I'm forced to use another cloud based relay. Symantec needs to fix this issue.
new idea 28 Jun 2016
Reposting to try and get traction... Remove SEPM Java Console Timeout implemented in v12.1.5. Might be good to force a timeout for the Small Business version, but for Enterprise, we should be able to choose NEVER, or at least something longer than one hour. I have multiple responsibilities, one of which is SEP. Having to login to the console multiple times during the day is a pain.
updated idea 27 Jun 2016
Not a big deal by any means but was hoping to submit a request to separate out alert types from Symantec.Cloud Email. As it stands, it does not look possible to separate the types of alerts that are sent. For example, I would only like to recieve alerts for Outbound Malware but instead I also recieve alerts for mail that exceeds out size limit.....
updated idea 24 Jun 2016
Commonly we'll assign a temporary PC name during PC configuration, then rename the PC when it gets deployed, but the alias still shows the temporary name instead of the correct computer name. In our managed environments, the computer name is far more important than the alias assigned at the time of SEP.cloud installation.  We would like the ability to have the ALIAS automatically ...
updated idea 23 Jun 2016
Better active directory integration.  it would be really nice to access everything from one console and not have to click and search to find computers or endpoints.  if i click on the client tab and go to my groups, it would be nice to just right click and install package, or highlight and select multiple workstations and right click and send package.  Other vendors have ...
updated idea 21 Jun 2016
Symantec Mail Security for Microsoft Exchange's quarantine has a few areas that could stand for some improvement. After quarantining a specific attachment type to stop 0day obfuscated Trojan downloaders, I found that I could not release legitimate emails to their intended recipients, because SMSE does not list recipients in the CC or BCC fields of an email.  Legitimate emails with just ...
updated idea 20 Jun 2016
Hi, For deployment via SCCM which is a Microsoft product it requires that we have a single MSI package for SEP client be created via SEPM  Currentlly we have 2 options one one is a single EXE file & other is MSI with sperate files for  the SEP client package that is created via SEPM We need a single MSI file for SEP client package so that the SEP client can be deployed via ...